Computers, Privacy and Data Protection最新文献

筛选
英文 中文
Disclosing or Protecting? Teenagers' Online Self-Disclosure 披露还是保护?青少年网络自我表露
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_14
M. Walrave, W. Heirman
{"title":"Disclosing or Protecting? Teenagers' Online Self-Disclosure","authors":"M. Walrave, W. Heirman","doi":"10.1007/978-94-007-0641-5_14","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_14","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing" 保护个人电脑免受网络钓鱼和间谍活动的选择:来自欧盟项目“开放可信计算”的报告
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_9
A. Weber, Dirk Weber
{"title":"Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project \"Open Trusted Computing\"","authors":"A. Weber, Dirk Weber","doi":"10.1007/978-94-007-0641-5_9","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_9","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115989628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization 个人身份权:环境智能的挑战与法律新概念的需要
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_4
Norberto Nuno Gomes de Andrade
{"title":"Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization","authors":"Norberto Nuno Gomes de Andrade","doi":"10.1007/978-94-007-0641-5_4","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_4","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Noise in the Archive: Oblivion in the Age of Total Recall 《档案中的噪音:全面回忆时代的遗忘
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_2
Jean-François Blanchette
{"title":"The Noise in the Archive: Oblivion in the Age of Total Recall","authors":"Jean-François Blanchette","doi":"10.1007/978-94-007-0641-5_2","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_2","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study 网格云系统中的访问控制:PerfCloud案例研究
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_20
V. Casola, Raffaele Lettiero, M. Rak, Umberto Villano
{"title":"Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study","authors":"V. Casola, Raffaele Lettiero, M. Rak, Umberto Villano","doi":"10.1007/978-94-007-0641-5_20","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_20","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"2a 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128196763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions 普适计算、隐私与数据保护:调和空前矛盾的选择与限制
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_7
J. Cas
{"title":"Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions","authors":"J. Cas","doi":"10.1007/978-94-007-0641-5_7","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_7","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125064990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Privacy-Preserving Data Mining from Outsourced Databases 从外包数据库中保护隐私的数据挖掘
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_19
F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, Wendy Hui Wang
{"title":"Privacy-Preserving Data Mining from Outsourced Databases","authors":"F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, Wendy Hui Wang","doi":"10.1007/978-94-007-0641-5_19","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_19","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Keeping Up Appearances: Audience Segregation in Social Network Sites 保持表象:社交网站中的受众隔离
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_10
B. V. D. Berg, R. Leenes
{"title":"Keeping Up Appearances: Audience Segregation in Social Network Sites","authors":"B. V. D. Berg, R. Leenes","doi":"10.1007/978-94-007-0641-5_10","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_10","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Data Protection in the Clouds 云中的数据保护
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_18
Y. Poullet, J.-M. Van Gyseghem, Jean-Philippe Moiny, J. Gérard, Claire Gayrel
{"title":"Data Protection in the Clouds","authors":"Y. Poullet, J.-M. Van Gyseghem, Jean-Philippe Moiny, J. Gérard, Claire Gayrel","doi":"10.1007/978-94-007-0641-5_18","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_18","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?) 德国宪法法院对数据保留的判决:相称性超越了无限制的监视(不是吗?)
Computers, Privacy and Data Protection Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-0641-5_1
K. Vries, R. Bellanova, P. Hert, S. Gutwirth
{"title":"The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)","authors":"K. Vries, R. Bellanova, P. Hert, S. Gutwirth","doi":"10.1007/978-94-007-0641-5_1","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_1","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信